|
Re: [edk2-platforms][PATCH V1 0/3] Platform/Sgi: enable support for UEFI secure boot
For this patch series:
Reviewed-by: Thomas Abraham <thomas.abraham@...>
[...]
IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you
For this patch series:
Reviewed-by: Thomas Abraham <thomas.abraham@...>
[...]
IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you
|
By
Thomas Abraham
·
#75921
·
|
|
Re: [edk2-platforms][PATCH V2 0/6] Platform/Sgi: Add initial support for RD-N2-Cfg1 platform
Pushed as 8cdd4cb7c71e..f7c08b9bae56
Thanks.
Regards,
Sami Mujawar
Pushed as 8cdd4cb7c71e..f7c08b9bae56
Thanks.
Regards,
Sami Mujawar
|
By
Sami Mujawar
·
#75920
·
|
|
Re: [PATCH v1 0/8] Measured SEV boot with kernel/initrd/cmdline
A bit more work is needed for that (but I agree it should be done),
because we have this additionally:
QemuFwCfgSelectItem (QemuFwCfgItemInitrdSize);
InitrdSize = (UINTN)QemuFwCfgRead32 ();
if
A bit more work is needed for that (but I agree it should be done),
because we have this additionally:
QemuFwCfgSelectItem (QemuFwCfgItemInitrdSize);
InitrdSize = (UINTN)QemuFwCfgRead32 ();
if
|
By
Laszlo Ersek
·
#75919
·
|
|
Re: [PATCH v2 1/1] UefiCpuPkg/CpuCommonFeaturesLib: Update processor location info
Reviewed-by: Ray Ni <ray.ni@...>
Reviewed-by: Ray Ni <ray.ni@...>
|
By
Ni, Ray
·
#75918
·
|
|
Re: [PATCH 1/4] BaseTools: Create CLANGDWARF toolchain
Liming,
I happen to notice the below patches which you sent out two years ago:
https://edk2.groups.io/g/devel/topic/31354044#41053
It seems to me that I can drop my CLANGDWARF change completely and
Liming,
I happen to notice the below patches which you sent out two years ago:
https://edk2.groups.io/g/devel/topic/31354044#41053
It seems to me that I can drop my CLANGDWARF change completely and
|
By
Ni, Ray
·
#75917
·
|
|
Re: [edk2-platforms][PATCH V4 00/11] Add SMBIOS tables for Arm's Reference Design platforms
Pushed as 86984c17d562..8cdd4cb7c71e, with minor changes to patch 4 and 7.
Thanks.
Regards,
Sami Mujawar
Pushed as 86984c17d562..8cdd4cb7c71e, with minor changes to patch 4 and 7.
Thanks.
Regards,
Sami Mujawar
|
By
Sami Mujawar
·
#75916
·
|
|
Re: [PATCH v2] Platform/ARM: Update Readme.md
Hi Rebecca,
Thank you for this patch.
Reviewed-by: Sami Mujawar <sami.mujawar@...>
Regards,
Sami Mujawar
Hi Rebecca,
Thank you for this patch.
Reviewed-by: Sami Mujawar <sami.mujawar@...>
Regards,
Sami Mujawar
|
By
Sami Mujawar
·
#75915
·
|
|
[PATCH V0 4/4] Platform/NXP/LS1046aFrwyPkg: Add OEM specific DSDT generator
This patch adds platform specific DSDT generator
and Clk dsdt properties for LS1046AFRWY platform.
Signed-off-by: Vikas Singh <vikas.singh@...>
---
.../AcpiTablesInclude/Dsdt/Clk.asl
This patch adds platform specific DSDT generator
and Clk dsdt properties for LS1046AFRWY platform.
Signed-off-by: Vikas Singh <vikas.singh@...>
---
.../AcpiTablesInclude/Dsdt/Clk.asl
|
By
Vikas Singh
·
#75914
·
|
|
[PATCH V0 3/4] Platform/NXP/LS1046aFrwyPkg: Extend Dynamic ACPI support
This patch set extends Configuration Manager (CM) and
its services to leverage the Dynamic ACPI support for
NXP's LS1046aFrwy
This patch set extends Configuration Manager (CM) and
its services to leverage the Dynamic ACPI support for
NXP's LS1046aFrwy
|
By
Vikas Singh
·
#75913
·
|
|
[PATCH V0 2/4] Silicon/NXP: Add support of SVR handling for LS1046FRWY
This change set intend to add a generic method to get
access to SoC's Silicon Version Register (SVR) and its
handling for LS1046aFrwy platform.
Signed-off-by: Vikas Singh
This change set intend to add a generic method to get
access to SoC's Silicon Version Register (SVR) and its
handling for LS1046aFrwy platform.
Signed-off-by: Vikas Singh
|
By
Vikas Singh
·
#75912
·
|
|
[PATCH V0 1/4] Platform/NXP: Add generic log in CM to print SoC version
Summary -
1.Configuration Manager(CM) is a common implementation
and should not evaluate the SoC version using macro's
However CM must directly consume SoC ver string from
platfrom who is
Summary -
1.Configuration Manager(CM) is a common implementation
and should not evaluate the SoC version using macro's
However CM must directly consume SoC ver string from
platfrom who is
|
By
Vikas Singh
·
#75911
·
|
|
Re: [edk2-platforms PATCH 1/1] Readme.md: Refer users to the Arm GNU-A Downloads page for toolchains
Hi Rebecca,
Thank you for this patch.
Reviewed-by: Sami Mujawar <sami.mujawar@...>
Regards,
Sami Mujawar
Hi Rebecca,
Thank you for this patch.
Reviewed-by: Sami Mujawar <sami.mujawar@...>
Regards,
Sami Mujawar
|
By
Sami Mujawar
·
#75910
·
|
|
[PATCH V0 0/4] Enable Dynamic ACPI for LS1046AFRWY
This patch series basically aims to extend the Dynamic ACPI
framework towards NXP's LS1046AFRWY platform.
Refer- https://edk2.groups.io/g/devel/message/71709
The change set in the series is in below
This patch series basically aims to extend the Dynamic ACPI
framework towards NXP's LS1046AFRWY platform.
Refer- https://edk2.groups.io/g/devel/message/71709
The change set in the series is in below
|
By
Vikas Singh
·
#75909
·
|
|
Re: [PATCH v1 0/8] Measured SEV boot with kernel/initrd/cmdline
...
I don't have any problems with that - I take it this means we can drop
the QemuFwCfgLib dependency from GenericQemuLoadImageLib altogether,
right?
This sounds like a good approach to me.
...
I don't have any problems with that - I take it this means we can drop
the QemuFwCfgLib dependency from GenericQemuLoadImageLib altogether,
right?
This sounds like a good approach to me.
|
By
Ard Biesheuvel
·
#75908
·
|
|
[PATCH v2 6/6] SecurityPkg: Add option to reset secure boot keys.
This commit add option which allows reset content of Secure Boot
keys and databases to default variables.
Signed-off-by: Grzegorz Bernacki <gjb@...>
---
This commit add option which allows reset content of Secure Boot
keys and databases to default variables.
Signed-off-by: Grzegorz Bernacki <gjb@...>
---
|
By
Grzegorz Bernacki
·
#75907
·
|
|
[PATCH v2 5/6] SecurityPkg: Add new modules to Security package.
This commits adds modules related to initialization and
usage of default Secure Boot key variables to SecurityPkg.
Signed-off-by: Grzegorz Bernacki <gjb@...>
---
SecurityPkg/SecurityPkg.dec
This commits adds modules related to initialization and
usage of default Secure Boot key variables to SecurityPkg.
Signed-off-by: Grzegorz Bernacki <gjb@...>
---
SecurityPkg/SecurityPkg.dec
|
By
Grzegorz Bernacki
·
#75906
·
|
|
[PATCH v2 4/6] SecurityPkg: Add EnrollFromDefaultKeys application.
This application allows user to force key enrollment from
Secure Boot default variables.
Signed-off-by: Grzegorz Bernacki <gjb@...>
---
This application allows user to force key enrollment from
Secure Boot default variables.
Signed-off-by: Grzegorz Bernacki <gjb@...>
---
|
By
Grzegorz Bernacki
·
#75905
·
|
|
[PATCH v2 3/6] SecurityPkg: Add SecureBootDefaultKeysDxe driver
This driver initializes default Secure Boot keys and databases
based on keys embedded in flash.
Signed-off-by: Grzegorz Bernacki <gjb@...>
---
This driver initializes default Secure Boot keys and databases
based on keys embedded in flash.
Signed-off-by: Grzegorz Bernacki <gjb@...>
---
|
By
Grzegorz Bernacki
·
#75904
·
|
|
[PATCH v2 1/6] SecurityPkg: Create library for setting Secure Boot variables.
This commits add library, which consist functions related
creation/removal Secure Boot variables. Some of the functions
was moved from SecureBootConfigImpl.c file.
Signed-off-by: Grzegorz Bernacki
This commits add library, which consist functions related
creation/removal Secure Boot variables. Some of the functions
was moved from SecureBootConfigImpl.c file.
Signed-off-by: Grzegorz Bernacki
|
By
Grzegorz Bernacki
·
#75903
·
|
|
[PATCH v2 2/6] SecurityPkg: Create include file for default key content.
This commits add file which can be included by platform Flash
Description File. It allows to specify certificate files, which
will be embedded into binary file. The content of these files
can be used
This commits add file which can be included by platform Flash
Description File. It allows to specify certificate files, which
will be embedded into binary file. The content of these files
can be used
|
By
Grzegorz Bernacki
·
#75902
·
|